Identity Theft and Data Security Breaches Get Started

A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading

Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred.
Enterprise IT uses BDS to protect against the variety of advanced threats, ... Continue Reading

The votes are tallied. The readers have spoken. Information Security is honoring readers’ picks for the best security hardware, appliances and services in our ninth-annual Readers’ Choice Awards. Continue Reading

Manage Identity Theft and Data Security Breaches

Video: Rich Mogull says if you take away any one of the Data Breach Triangle's three key components, a breach becomes impossible. The Securosis CEO explains this unique perspective on data breach prevention. Continue Reading